Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
OpenVPN is Open to VPN Fingerprinting
- Diwen Xue,
- Reethika Ramesh,
- Arham Jain,
- Michaelis Kallitsis,
- J. Alex Halderman,
- Jedidiah R. Crandall,
- Roya Ensafi
Communications of the ACM (CACM), Volume 68, Issue 1Pages 79–87https://doi.org/10.1145/3618117VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using “dual use” DPI ...
- opinionNovember 2024
Notice and Choice Cannot Stand Alone
Communications of the ACM (CACM), Volume 67, Issue 12Pages 37–39https://doi.org/10.1145/3699527Privacy notice and choice has largely failed us so far because we are not giving it the legal and technical support it needs.
-
- research-articleNovember 2024
Confidential Computing or Cryptographic Computing?
Communications of the ACM (CACM), Volume 67, Issue 12Pages 44–51https://doi.org/10.1145/3677616Trade-offs between secure computation via cryptography and hardware enclaves.
- research-articleNovember 2024
Belt and Braces: When Federated Learning Meets Differential Privacy
Communications of the ACM (CACM), Volume 67, Issue 12Pages 66–77https://doi.org/10.1145/3650028Federated learning (FL) has great potential for large-scale machine learning (ML) without exposing raw data. Differential privacy (DP) is the de facto standard of privacy protection with provable guarantees. Advances in ML suggest that DP would be a ...
Building federated learning with differential privacy to train and refine machine-learning models with more comprehensive datasets can help exploit the potential of machine learning to its fullest.
- opinionOctober 2024
The Future of Misuse Detection
Communications of the ACM (CACM), Volume 67, Issue 11Pages 27–28https://doi.org/10.1145/3689596From lessons learned to new directions.
- research-articleOctober 2024
Human-Centered Cybersecurity Revisited: From Enemies to Partners
Communications of the ACM (CACM), Volume 67, Issue 11Pages 72–81https://doi.org/10.1145/3665665Focusing on "enabling approaches" that treat humans as partners can add another layer of protection to our cybersecurity defenses.
- research-articleOctober 2024
Pitfalls in Machine Learning for Computer Security
- Daniel Arp,
- Erwin Quiring,
- Feargus Pendlebury,
- Alexander Warnecke,
- Fabio Pierazzi,
- Christian Wressnegger,
- Lorenzo Cavallaro,
- Konrad Rieck
Communications of the ACM (CACM), Volume 67, Issue 11Pages 104–112https://doi.org/10.1145/3643456With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas. This development has influenced computer security, spawning a ...
- research-articleSeptember 2024
Confidential Container Groups
- Matthew A. Johnson,
- Stavros Volos,
- Ken Gordon,
- Sean T. Allen,
- Christoph M. Wintersteiger,
- Sylvan Clebsch,
- John Starks,
- Manuel Costa
Communications of the ACM (CACM), Volume 67, Issue 10Pages 40–49https://doi.org/10.1145/3686261Implementing confidential computing on Azure container instances.
- research-articleSeptember 2024
Elevating Security with Arm CCA
Communications of the ACM (CACM), Volume 67, Issue 10Pages 34–39https://doi.org/10.1145/3685700Attestation and verification are integral to adopting confidential computing.
- research-articleSeptember 2024
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility
Communications of the ACM (CACM), Volume 67, Issue 10Pages 70–80https://doi.org/10.1145/3660628To counter the threat of AI-powered bots, captcha systems are growing increasingly complex, often sacrificing usability and accessibility. Can mCaptcha, a proof-of-work captcha system, effectively address these issues?
- research-articleAugust 2024
Trustworthy AI Using Confidential Federated Learning
Communications of the ACM (CACM), Volume 67, Issue 9Pages 48–53https://doi.org/10.1145/3677390Federated learning and confidential computing are not competing technologies.
- opinionAugust 2024
Improving Privacy and Security of Telehealth
- Faiza Tazi,
- Josiah Dykstra,
- Prashanth Rajivan,
- Kapil Chalil Madathil,
- Jiovanne Hughart,
- James McElligott,
- Daniel Votipka,
- Sanchari Das
Communications of the ACM (CACM), Volume 67, Issue 9Pages 27–30https://doi.org/10.1145/3651223Dek :Multidisciplinary experts’ perspectives on how to strengthen protection of patients’ health information in telehealth designs and workflows.